Impact
When DDS Security is enabled in eProsima Fast‑DDS, an attacker can craft a DATA Submessage inside a SPDP packet that manipulates the length field of readPropertySeq. This triggers an integer overflow during a resize operation, causing an Out‑of‑Memory condition that terminates the Fast‑DDS process. The vulnerability results in a loss of service availability for the affected application.
Affected Systems
The flaw applies to eProsima Fast‑DDS releases prior to 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1 when DDS Security is activated. The vulnerability is present only on binaries that include the security mode and process incoming SPDP packets from publishers. All versions before the aforementioned fixes are susceptible.
Risk and Exploitability
The CVSS score of 8.6 classifies this issue as high severity. The EPSS score of less than 1% indicates a very low probability of exploitation, and the vulnerability is currently not listed in the CISA KEV catalog. However, exploitation requires an attacker to send a malicious SPDP packet over the network, which is possible from any remote node with network access to the Fast‑DDS domain. Successful exploitation leads to an immediate crash of the Fast‑DDS process, causing a denial of service to any service relying on that instance.
OpenCVE Enrichment